← Back to Legal & Compliance

Security & Technical Measures

Armour Consortium AI - Cart Recovery API
Legal Basis: Article 32 UK GDPR / EU GDPR | Last Updated: December 2025

1. Executive Summary

Armour Consortium AI implements comprehensive security measures to protect data processed through the Cart Recovery API. Our architecture is designed around the principle of transient processing - we don't store personal data, eliminating the primary vector for data breaches.


2. Security Architecture

2.1 Core Principle: Transient Processing

AspectImplementation
Data LifecycleMilliseconds (request → response)
StorageNone - processed in memory only
Database PIINone stored
Log FilesNo personal data logged
BackupsN/A - nothing to back up

You can't breach what you don't store.

2.2 Architecture Diagram

[Client] --TLS 1.3--> [API Gateway] --Memory--> [Ensemble Processing] --TLS--> [Sub-processors]
                           |
                           v
                    [Rate Limiting]
                    [Input Validation]
                    [Consent Enforcement]
                           |
                           v
                    [Response Generated]
                           |
                           v
                    [Memory Cleared]

3. Technical Security Measures

3.1 Encryption

LayerMeasureStandard
In TransitTLS 1.3All API communications
At RestN/ANo data stored
Sub-processorTLS 1.2+All outbound Ensemble calls

3.2 Access Control

MeasureImplementation
x402 AuthenticationCryptographic payment verification
Internal Bypass256-bit secret, timing-safe comparison
Rate Limiting220 requests/minute global
Wallet VerificationBase network transaction validation

3.3 Input Validation

CheckImplementation
Schema ValidationStrict JSON schema enforcement
Type CheckingAll fields validated for expected types
Length LimitsMaximum field lengths enforced
Injection PreventionInput sanitisation for Ensemble prompts
Malicious Payload DetectionPattern matching for attack vectors

3.4 Output Security

MeasureImplementation
Content SanitisationHTML outputs sanitised
No PII in LogsPersonal data never logged
Response ValidationOutputs checked before return

4. Infrastructure Security

4.1 Hosting Environment

AspectImplementation
PlatformReplit cloud infrastructure
IsolationContainer-based isolation
NetworkingPrivate networking for internal services
EgressRestricted to approved sub-processors

4.2 Database Security

MeasureImplementation
ProviderNeon (serverless PostgreSQL)
Data StoredAnonymised analytics only
PII StoredNone
EncryptionNeon-managed encryption at rest
AccessConnection string in secrets manager

4.3 Secrets Management

MeasureImplementation
API KeysEnvironment secrets, never in code
RotationRegular rotation schedule
Access LoggingSecret access is audited
Least PrivilegeMinimal necessary access

5. Application Security

5.1 Security Headers

HeaderValue
Strict-Transport-Securitymax-age=31536000; includeSubDomains
X-Content-Type-Optionsnosniff
X-Frame-OptionsDENY
X-XSS-Protection1; mode=block
Content-Security-PolicyRestrictive policy

5.2 CORS Policy

SettingValue
Allowed OriginsAPI clients only
Allowed MethodsGET, POST as appropriate
CredentialsNot required

5.3 Error Handling

PrincipleImplementation
No Stack TracesNever exposed to clients
Generic ErrorsNon-specific error messages
Error LoggingInternal only, no PII
Graceful DegradationMulti-tier failover

6. Operational Security

6.1 Monitoring

AspectImplementation
Health Checks/api/x402/health endpoint
Uptime MonitoringAutomated availability checks
Error Rate TrackingAnomaly detection
Rate Limit MonitoringAbuse detection

6.2 Incident Response

PhaseAction
DetectionAutomated monitoring, anomaly alerts
ContainmentRate limiting, IP blocking capability
AssessmentRoot cause analysis
Notification72-hour notification to affected Controllers
RecoveryService restoration procedures
Lessons LearnedPost-incident review

6.3 Business Continuity

MeasureImplementation
Proprietary multi-model FailoverThree-tier AI provider redundancy chain
Never 5xxSystem always returns usable content
Timeout Handling8000ms provider timeout with fallback
Degraded ModeReduced functionality vs. failure

7. Consent & Compliance Enforcement

7.1 Technical Consent Enforcement

CheckImplementation
SMS Opt-Outaccepts_sms_marketing: false blocks SMS/WhatsApp
Email Opt-Outaccepts_email_marketing: false blocks email
Dual Opt-OutBoth false = COMPLIANCE_BLOCKED, no Ensemble processing
ValidationConsent flags validated on every request

7.2 Compliance Logging

EventLogged
COMPLIANCE_BLOCKEDAnonymised count
Channel SuppressionAnonymised statistics
Request VolumeAggregate only
PIINever logged

8. Sub-Processor Security

8.1 Due Diligence

CheckFrequency
Security CertificationsVerified at engagement
SOC 2 / ISO 27001Annual verification
Privacy Policy ReviewAnnual
DPA in PlaceConfirmed before use

8.2 Data Minimisation to Sub-Processors

SentNot Sent
First nameEmail address
Cart itemsPhone number
Cart valueCustomer ID
Brand voiceOrder history

Only data necessary for content generation is transmitted.


9. Security Testing

9.1 Testing Programme

Test TypeFrequency
Automated Vulnerability ScanningContinuous
Dependency ScanningOn deployment
Code ReviewAll changes
Penetration TestingAnnual (planned)

9.2 Vulnerability Management

SeverityResponse Time
Critical24 hours
High72 hours
Medium7 days
Low30 days

10. Physical Security

AspectImplementation
Data CentreCloud provider managed
Physical AccessProvider-controlled
EnvironmentalProvider-managed

As a cloud-hosted service, physical security is delegated to infrastructure providers (Replit, Neon).


11. Personnel Security

MeasureImplementation
Access ControlRole-based, least privilege
TrainingData protection awareness
ConfidentialityContractual obligations
OffboardingImmediate access revocation

12. Security Certifications

CertificationStatus
SOC 2 Type IITarget 2026 (pending scale)
GDPR ComplianceImplemented

13. Audit & Documentation

DocumentAvailability
Security PolicyThis document
Penetration Test ReportsUpon request (with NDA)
Compliance CertificationsUpon request
Incident HistoryNone to date

14. Security Contact

For security concerns or to report vulnerabilities:

Email: hello@armourconsortium.ai
Subject: Security - [Brief Description]

We aim to acknowledge security reports within 24 hours.


15. Version History

VersionDateChanges
1.0December 2025Initial security documentation

This document describes the technical and organisational security measures implemented by Armour Consortium AI in accordance with Article 32 UK GDPR and EU GDPR.